Block lateral movement of cyberthreats: Within your virtual network, cyberthreats move laterally from VM to VM in an east-west manner, placing your mission-critical applications and data at risk.Our zone-based policy architecture enables you to build access control policies based on the application and the user, effectively segmenting the applications and protecting east-west traffic between virtual machines.
0 Comments
Leave a Reply. |